diff options
author | Darren Tucker <dtucker@zip.com.au> | 2003-06-28 12:38:01 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2003-06-28 12:38:01 +1000 |
commit | 502d384b74fae68dd9e265f48c2026cef6c12806 (patch) | |
tree | 23aa1a738e0c94ffdc6efa196ab1bbb2a51afe8a | |
parent | 674f71d77e3683746a960a13da39d2d68cdcafad (diff) |
- markus@cvs.openbsd.org 2003/06/24 08:23:46
[auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
int -> u_int; ok djm@, deraadt@, mouring@
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | auth2-hostbased.c | 4 | ||||
-rw-r--r-- | auth2-pubkey.c | 4 | ||||
-rw-r--r-- | auth2.c | 4 | ||||
-rw-r--r-- | channels.c | 4 | ||||
-rw-r--r-- | key.c | 6 | ||||
-rw-r--r-- | key.h | 4 | ||||
-rw-r--r-- | monitor.c | 4 | ||||
-rw-r--r-- | packet.c | 8 | ||||
-rw-r--r-- | packet.h | 6 | ||||
-rw-r--r-- | serverloop.c | 6 | ||||
-rw-r--r-- | sshconnect2.c | 6 | ||||
-rw-r--r-- | sshd.c | 4 |
13 files changed, 35 insertions, 31 deletions
@@ -3,6 +3,10 @@ | |||
3 | - markus@cvs.openbsd.org 2003/06/23 09:02:44 | 3 | - markus@cvs.openbsd.org 2003/06/23 09:02:44 |
4 | [ssh_config.5] | 4 | [ssh_config.5] |
5 | document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@ | 5 | document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@ |
6 | - markus@cvs.openbsd.org 2003/06/24 08:23:46 | ||
7 | [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h | ||
8 | monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c] | ||
9 | int -> u_int; ok djm@, deraadt@, mouring@ | ||
6 | 10 | ||
7 | 20030624 | 11 | 20030624 |
8 | - (dtucker) Have configure refer the user to config.log and | 12 | - (dtucker) Have configure refer the user to config.log and |
@@ -589,4 +593,4 @@ | |||
589 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. | 593 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. |
590 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au | 594 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au |
591 | 595 | ||
592 | $Id: ChangeLog,v 1.2824 2003/06/28 02:33:12 dtucker Exp $ | 596 | $Id: ChangeLog,v 1.2825 2003/06/28 02:38:01 dtucker Exp $ |
diff --git a/auth2-hostbased.c b/auth2-hostbased.c index bbc7d8a4d..505d3eff4 100644 --- a/auth2-hostbased.c +++ b/auth2-hostbased.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: auth2-hostbased.c,v 1.4 2003/06/02 09:17:34 markus Exp $"); | 26 | RCSID("$OpenBSD: auth2-hostbased.c,v 1.5 2003/06/24 08:23:46 markus Exp $"); |
27 | 27 | ||
28 | #include "ssh2.h" | 28 | #include "ssh2.h" |
29 | #include "xmalloc.h" | 29 | #include "xmalloc.h" |
@@ -42,7 +42,7 @@ RCSID("$OpenBSD: auth2-hostbased.c,v 1.4 2003/06/02 09:17:34 markus Exp $"); | |||
42 | /* import */ | 42 | /* import */ |
43 | extern ServerOptions options; | 43 | extern ServerOptions options; |
44 | extern u_char *session_id2; | 44 | extern u_char *session_id2; |
45 | extern int session_id2_len; | 45 | extern u_int session_id2_len; |
46 | 46 | ||
47 | static int | 47 | static int |
48 | userauth_hostbased(Authctxt *authctxt) | 48 | userauth_hostbased(Authctxt *authctxt) |
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 85ee33eed..d51e939f1 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: auth2-pubkey.c,v 1.3 2003/04/08 20:21:28 itojun Exp $"); | 26 | RCSID("$OpenBSD: auth2-pubkey.c,v 1.4 2003/06/24 08:23:46 markus Exp $"); |
27 | 27 | ||
28 | #include "ssh2.h" | 28 | #include "ssh2.h" |
29 | #include "xmalloc.h" | 29 | #include "xmalloc.h" |
@@ -44,7 +44,7 @@ RCSID("$OpenBSD: auth2-pubkey.c,v 1.3 2003/04/08 20:21:28 itojun Exp $"); | |||
44 | /* import */ | 44 | /* import */ |
45 | extern ServerOptions options; | 45 | extern ServerOptions options; |
46 | extern u_char *session_id2; | 46 | extern u_char *session_id2; |
47 | extern int session_id2_len; | 47 | extern u_int session_id2_len; |
48 | 48 | ||
49 | static int | 49 | static int |
50 | userauth_pubkey(Authctxt *authctxt) | 50 | userauth_pubkey(Authctxt *authctxt) |
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: auth2.c,v 1.98 2003/05/14 02:15:47 markus Exp $"); | 26 | RCSID("$OpenBSD: auth2.c,v 1.99 2003/06/24 08:23:46 markus Exp $"); |
27 | 27 | ||
28 | #include "ssh2.h" | 28 | #include "ssh2.h" |
29 | #include "xmalloc.h" | 29 | #include "xmalloc.h" |
@@ -39,7 +39,7 @@ RCSID("$OpenBSD: auth2.c,v 1.98 2003/05/14 02:15:47 markus Exp $"); | |||
39 | /* import */ | 39 | /* import */ |
40 | extern ServerOptions options; | 40 | extern ServerOptions options; |
41 | extern u_char *session_id2; | 41 | extern u_char *session_id2; |
42 | extern int session_id2_len; | 42 | extern u_int session_id2_len; |
43 | 43 | ||
44 | Authctxt *x_authctxt = NULL; | 44 | Authctxt *x_authctxt = NULL; |
45 | 45 | ||
diff --git a/channels.c b/channels.c index ad879cc61..04ef6575c 100644 --- a/channels.c +++ b/channels.c | |||
@@ -39,7 +39,7 @@ | |||
39 | */ | 39 | */ |
40 | 40 | ||
41 | #include "includes.h" | 41 | #include "includes.h" |
42 | RCSID("$OpenBSD: channels.c,v 1.190 2003/05/11 20:30:24 markus Exp $"); | 42 | RCSID("$OpenBSD: channels.c,v 1.191 2003/06/24 08:23:46 markus Exp $"); |
43 | 43 | ||
44 | #include "ssh.h" | 44 | #include "ssh.h" |
45 | #include "ssh1.h" | 45 | #include "ssh1.h" |
@@ -419,7 +419,7 @@ channel_not_very_much_buffered_data(void) | |||
419 | } | 419 | } |
420 | #endif | 420 | #endif |
421 | if (buffer_len(&c->output) > packet_get_maxsize()) { | 421 | if (buffer_len(&c->output) > packet_get_maxsize()) { |
422 | debug2("channel %d: big output buffer %d > %d", | 422 | debug2("channel %d: big output buffer %u > %u", |
423 | c->self, buffer_len(&c->output), | 423 | c->self, buffer_len(&c->output), |
424 | packet_get_maxsize()); | 424 | packet_get_maxsize()); |
425 | return 0; | 425 | return 0; |
@@ -32,7 +32,7 @@ | |||
32 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 32 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
33 | */ | 33 | */ |
34 | #include "includes.h" | 34 | #include "includes.h" |
35 | RCSID("$OpenBSD: key.c,v 1.52 2003/05/14 18:16:20 jakob Exp $"); | 35 | RCSID("$OpenBSD: key.c,v 1.53 2003/06/24 08:23:46 markus Exp $"); |
36 | 36 | ||
37 | #include <openssl/evp.h> | 37 | #include <openssl/evp.h> |
38 | 38 | ||
@@ -438,7 +438,7 @@ key_read(Key *ret, char **cpp) | |||
438 | xfree(blob); | 438 | xfree(blob); |
439 | return -1; | 439 | return -1; |
440 | } | 440 | } |
441 | k = key_from_blob(blob, n); | 441 | k = key_from_blob(blob, (u_int)n); |
442 | xfree(blob); | 442 | xfree(blob); |
443 | if (k == NULL) { | 443 | if (k == NULL) { |
444 | error("key_read: key_from_blob %s failed", cp); | 444 | error("key_read: key_from_blob %s failed", cp); |
@@ -674,7 +674,7 @@ key_names_valid2(const char *names) | |||
674 | } | 674 | } |
675 | 675 | ||
676 | Key * | 676 | Key * |
677 | key_from_blob(u_char *blob, int blen) | 677 | key_from_blob(u_char *blob, u_int blen) |
678 | { | 678 | { |
679 | Buffer b; | 679 | Buffer b; |
680 | char *ktype; | 680 | char *ktype; |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: key.h,v 1.21 2003/05/14 18:16:20 jakob Exp $ */ | 1 | /* $OpenBSD: key.h,v 1.22 2003/06/24 08:23:46 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
@@ -71,7 +71,7 @@ Key *key_generate(int, u_int); | |||
71 | Key *key_from_private(Key *); | 71 | Key *key_from_private(Key *); |
72 | int key_type_from_name(char *); | 72 | int key_type_from_name(char *); |
73 | 73 | ||
74 | Key *key_from_blob(u_char *, int); | 74 | Key *key_from_blob(u_char *, u_int); |
75 | int key_to_blob(Key *, u_char **, u_int *); | 75 | int key_to_blob(Key *, u_char **, u_int *); |
76 | char *key_ssh_name(Key *); | 76 | char *key_ssh_name(Key *); |
77 | int key_names_valid2(const char *); | 77 | int key_names_valid2(const char *); |
@@ -25,7 +25,7 @@ | |||
25 | */ | 25 | */ |
26 | 26 | ||
27 | #include "includes.h" | 27 | #include "includes.h" |
28 | RCSID("$OpenBSD: monitor.c,v 1.43 2003/06/12 07:57:38 markus Exp $"); | 28 | RCSID("$OpenBSD: monitor.c,v 1.44 2003/06/24 08:23:46 markus Exp $"); |
29 | 29 | ||
30 | #include <openssl/dh.h> | 30 | #include <openssl/dh.h> |
31 | 31 | ||
@@ -141,7 +141,7 @@ static int key_blobtype = MM_NOKEY; | |||
141 | static char *hostbased_cuser = NULL; | 141 | static char *hostbased_cuser = NULL; |
142 | static char *hostbased_chost = NULL; | 142 | static char *hostbased_chost = NULL; |
143 | static char *auth_method = "unknown"; | 143 | static char *auth_method = "unknown"; |
144 | static int session_id2_len = 0; | 144 | static u_int session_id2_len = 0; |
145 | static u_char *session_id2 = NULL; | 145 | static u_char *session_id2 = NULL; |
146 | static pid_t monitor_child_pid; | 146 | static pid_t monitor_child_pid; |
147 | 147 | ||
@@ -37,7 +37,7 @@ | |||
37 | */ | 37 | */ |
38 | 38 | ||
39 | #include "includes.h" | 39 | #include "includes.h" |
40 | RCSID("$OpenBSD: packet.c,v 1.107 2003/06/10 22:20:52 deraadt Exp $"); | 40 | RCSID("$OpenBSD: packet.c,v 1.108 2003/06/24 08:23:46 markus Exp $"); |
41 | 41 | ||
42 | #include "openbsd-compat/sys-queue.h" | 42 | #include "openbsd-compat/sys-queue.h" |
43 | 43 | ||
@@ -108,7 +108,7 @@ static int compression_buffer_ready = 0; | |||
108 | static int packet_compression = 0; | 108 | static int packet_compression = 0; |
109 | 109 | ||
110 | /* default maximum packet size */ | 110 | /* default maximum packet size */ |
111 | int max_packet_size = 32768; | 111 | u_int max_packet_size = 32768; |
112 | 112 | ||
113 | /* Flag indicating whether this module has been initialized. */ | 113 | /* Flag indicating whether this module has been initialized. */ |
114 | static int initialized = 0; | 114 | static int initialized = 0; |
@@ -1446,8 +1446,8 @@ packet_is_interactive(void) | |||
1446 | return interactive_mode; | 1446 | return interactive_mode; |
1447 | } | 1447 | } |
1448 | 1448 | ||
1449 | int | 1449 | u_int |
1450 | packet_set_maxsize(int s) | 1450 | packet_set_maxsize(u_int s) |
1451 | { | 1451 | { |
1452 | static int called = 0; | 1452 | static int called = 0; |
1453 | 1453 | ||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: packet.h,v 1.39 2003/04/08 20:21:29 itojun Exp $ */ | 1 | /* $OpenBSD: packet.h,v 1.40 2003/06/24 08:23:46 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -81,8 +81,8 @@ void packet_add_padding(u_char); | |||
81 | void tty_make_modes(int, struct termios *); | 81 | void tty_make_modes(int, struct termios *); |
82 | void tty_parse_modes(int, int *); | 82 | void tty_parse_modes(int, int *); |
83 | 83 | ||
84 | extern int max_packet_size; | 84 | extern u_int max_packet_size; |
85 | int packet_set_maxsize(int); | 85 | u_int packet_set_maxsize(u_int); |
86 | #define packet_get_maxsize() max_packet_size | 86 | #define packet_get_maxsize() max_packet_size |
87 | 87 | ||
88 | /* don't allow remaining bytes after the end of the message */ | 88 | /* don't allow remaining bytes after the end of the message */ |
diff --git a/serverloop.c b/serverloop.c index 90eec0855..a95390273 100644 --- a/serverloop.c +++ b/serverloop.c | |||
@@ -35,7 +35,7 @@ | |||
35 | */ | 35 | */ |
36 | 36 | ||
37 | #include "includes.h" | 37 | #include "includes.h" |
38 | RCSID("$OpenBSD: serverloop.c,v 1.109 2003/06/04 12:03:59 djm Exp $"); | 38 | RCSID("$OpenBSD: serverloop.c,v 1.110 2003/06/24 08:23:46 markus Exp $"); |
39 | 39 | ||
40 | #include "xmalloc.h" | 40 | #include "xmalloc.h" |
41 | #include "packet.h" | 41 | #include "packet.h" |
@@ -158,7 +158,7 @@ sigchld_handler(int sig) | |||
158 | static void | 158 | static void |
159 | make_packets_from_stderr_data(void) | 159 | make_packets_from_stderr_data(void) |
160 | { | 160 | { |
161 | int len; | 161 | u_int len; |
162 | 162 | ||
163 | /* Send buffered stderr data to the client. */ | 163 | /* Send buffered stderr data to the client. */ |
164 | while (buffer_len(&stderr_buffer) > 0 && | 164 | while (buffer_len(&stderr_buffer) > 0 && |
@@ -187,7 +187,7 @@ make_packets_from_stderr_data(void) | |||
187 | static void | 187 | static void |
188 | make_packets_from_stdout_data(void) | 188 | make_packets_from_stdout_data(void) |
189 | { | 189 | { |
190 | int len; | 190 | u_int len; |
191 | 191 | ||
192 | /* Send buffered stdout data to the client. */ | 192 | /* Send buffered stdout data to the client. */ |
193 | while (buffer_len(&stdout_buffer) > 0 && | 193 | while (buffer_len(&stdout_buffer) > 0 && |
diff --git a/sshconnect2.c b/sshconnect2.c index 1b85730fe..6a0bd409a 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: sshconnect2.c,v 1.119 2003/05/15 00:28:28 markus Exp $"); | 26 | RCSID("$OpenBSD: sshconnect2.c,v 1.120 2003/06/24 08:23:46 markus Exp $"); |
27 | 27 | ||
28 | #ifdef KRB5 | 28 | #ifdef KRB5 |
29 | #include <krb5.h> | 29 | #include <krb5.h> |
@@ -67,7 +67,7 @@ extern Options options; | |||
67 | */ | 67 | */ |
68 | 68 | ||
69 | u_char *session_id2 = NULL; | 69 | u_char *session_id2 = NULL; |
70 | int session_id2_len = 0; | 70 | u_int session_id2_len = 0; |
71 | 71 | ||
72 | char *xxx_host; | 72 | char *xxx_host; |
73 | struct sockaddr *xxx_hostaddr; | 73 | struct sockaddr *xxx_hostaddr; |
@@ -591,7 +591,7 @@ sign_and_send_pubkey(Authctxt *authctxt, Identity *id) | |||
591 | Buffer b; | 591 | Buffer b; |
592 | u_char *blob, *signature; | 592 | u_char *blob, *signature; |
593 | u_int bloblen, slen; | 593 | u_int bloblen, slen; |
594 | int skip = 0; | 594 | u_int skip = 0; |
595 | int ret = -1; | 595 | int ret = -1; |
596 | int have_sig = 1; | 596 | int have_sig = 1; |
597 | 597 | ||
@@ -42,7 +42,7 @@ | |||
42 | */ | 42 | */ |
43 | 43 | ||
44 | #include "includes.h" | 44 | #include "includes.h" |
45 | RCSID("$OpenBSD: sshd.c,v 1.268 2003/06/04 10:23:48 djm Exp $"); | 45 | RCSID("$OpenBSD: sshd.c,v 1.269 2003/06/24 08:23:46 markus Exp $"); |
46 | 46 | ||
47 | #include <openssl/dh.h> | 47 | #include <openssl/dh.h> |
48 | #include <openssl/bn.h> | 48 | #include <openssl/bn.h> |
@@ -188,7 +188,7 @@ u_char session_id[16]; | |||
188 | 188 | ||
189 | /* same for ssh2 */ | 189 | /* same for ssh2 */ |
190 | u_char *session_id2 = NULL; | 190 | u_char *session_id2 = NULL; |
191 | int session_id2_len = 0; | 191 | u_int session_id2_len = 0; |
192 | 192 | ||
193 | /* record remote hostname or ip */ | 193 | /* record remote hostname or ip */ |
194 | u_int utmp_len = MAXHOSTNAMELEN; | 194 | u_int utmp_len = MAXHOSTNAMELEN; |